Vulnerable software
MongoDB
Version: 2.x and earlier
Application link:
http://www.mongodb.org/
Severity level
Severity level: High
Impact: Remote Code Execution
Access Vector: Remote
CVSS v2:
Base Score: 8.3
Vector: (AV:AN/AC:L/AU:N/C:C/I:C/A:C)
CVE: not assigned
Software description
MongoDB is an open-source document-centric database management system (DBMS) that do not require description of scheme of tables.
Vulnerability description
The specialists of the Positive Research center have detected a Remote Code Execution vulnerability in MongoDB application.
If an attacker manages to call REST interface that is run on 28017 port by default, he or she can execute SSJS code.
How to fix
Update your software up to the latest version
Advisory status
10.09.2012 - Vendor gets vulnerability details
13.02.2013 - Vendor releases fixed version and details
10.07.2013 - Public disclosure
Credits
The vulnerability was detected by Mikhail Firstov, Positive Research Center (Positive Technologies Company)
References
https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2012-40/
Reports on the vulnerabilities previously discovered by Positive Research:
http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/